Skip to main content
Top

2025 | OriginalPaper | Chapter

MEUSec – Method for Enhancing User Experience and Information Security

Authors : Max Sauer, Christoph Becker, Andreas Oberweis, Simon Pfeifer, Jan Sürmeli

Published in: Advances in Mobile Computing and Multimedia Intelligence

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Digital identity wallets enable the management of digital identities and verification documents such as ID cards and driving licences. This data can be stored efficiently in one place on user devices. Research shows that some of the existing digital identity wallets have user experience and information security deficits. Users struggle to understand the concept of digital identity wallets, personal information is often inadequately secured or released to untrusted parties. Moreover, user experience and information security might influence each other negatively. Hence, it is necessary to consider user experience and information security simultaneously, and to evaluate and improve them together. However, existing methods focus on either aspect and do not consider their interplay. In this paper, we present the MEUSec method to facilitate an analysis and improvement of user experience and information security of digital identity wallets.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
3.
go back to reference ISO: ISO/IEC 27000:2018(en) Information technology - Security techniques - Information security management systems - Overview and vocabulary (2018) ISO: ISO/IEC 27000:2018(en) Information technology - Security techniques - Information security management systems - Overview and vocabulary (2018)
5.
6.
go back to reference Korir, M., Parkin, S., Dunphy, P.: An empirical study of a decentralized identity wallet: usability, security, and perspectives on user control. In: Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), pp. 195–211 (2022) Korir, M., Parkin, S., Dunphy, P.: An empirical study of a decentralized identity wallet: usability, security, and perspectives on user control. In: Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), pp. 195–211 (2022)
10.
go back to reference Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Celebrating Interdependence (CHI 1994), pp. 152–158. ACM Press, Boston (1994). https://doi.org/10.1145/191666.191729 Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Celebrating Interdependence (CHI 1994), pp. 152–158. ACM Press, Boston (1994). https://​doi.​org/​10.​1145/​191666.​191729
11.
13.
go back to reference Realpe, P.C., Collazos, C.A., Hurtado, J., Granollers, A.: A set of heuristics for usable security and user authentication. In: Proceedings of the 17th International Conference on Human Computer Interaction, pp. 1–8. ACM, Salamanca (2016). https://doi.org/10.1145/2998626.2998662 Realpe, P.C., Collazos, C.A., Hurtado, J., Granollers, A.: A set of heuristics for usable security and user authentication. In: Proceedings of the 17th International Conference on Human Computer Interaction, pp. 1–8. ACM, Salamanca (2016). https://​doi.​org/​10.​1145/​2998626.​2998662
14.
go back to reference Rusu, C., Roncagliolo, S., Rusu, V., Collazos, C.: A Methodology to establish usability heuristics. In: Proceedings of the 4th International Conference on Advances in Com-puter-Human Interactions (ACHI 2011) (2011) Rusu, C., Roncagliolo, S., Rusu, V., Collazos, C.: A Methodology to establish usability heuristics. In: Proceedings of the 4th International Conference on Advances in Com-puter-Human Interactions (ACHI 2011) (2011)
15.
go back to reference Sartor, S., Sedlmeir, J., Rieger, A., Roth, T.: Love at first sight? a user experience study of self-sovereign identity Wallets. In: Proceedings of the 30th European Conference on Information Systems (ECIS 2022) (2022) Sartor, S., Sedlmeir, J., Rieger, A., Roth, T.: Love at first sight? a user experience study of self-sovereign identity Wallets. In: Proceedings of the 30th European Conference on Information Systems (ECIS 2022) (2022)
17.
go back to reference Sauer, M., Alpers, S., Becker, C.: Comparison of methods for analyzing the correlation of user experience and information security. In: Proceedings of the 5th International Conference on Software Engineering and Development (ICSED 2023). ACM, New York (2024). https://doi.org/10.1145/3637792.3637794 Sauer, M., Alpers, S., Becker, C.: Comparison of methods for analyzing the correlation of user experience and information security. In: Proceedings of the 5th International Conference on Software Engineering and Development (ICSED 2023). ACM, New York (2024). https://​doi.​org/​10.​1145/​3637792.​3637794
18.
go back to reference Sauer, M., Becker, C., Oberweis, A., Schork, S., Sürmeli, J.: User experience and information security heuristics for digital identity wallets. In: Proceedings of the 8th International Conference on Computer-Human Interaction Research and Applications (CHIRA 2024), Porto, Portugal (2024) Sauer, M., Becker, C., Oberweis, A., Schork, S., Sürmeli, J.: User experience and information security heuristics for digital identity wallets. In: Proceedings of the 8th International Conference on Computer-Human Interaction Research and Applications (CHIRA 2024), Porto, Portugal (2024)
24.
go back to reference Wharton, C., Rieman, J., Lewis, C., Polson, P.: The cognitive walkthrough method: a practitioner’s guide. In: Usability Inspection Methods, pp. 105–140. John Wiley & Sons, Inc., Hoboken (1994) Wharton, C., Rieman, J., Lewis, C., Polson, P.: The cognitive walkthrough method: a practitioner’s guide. In: Usability Inspection Methods, pp. 105–140. John Wiley & Sons, Inc., Hoboken (1994)
25.
go back to reference Whitten, A., Tygar, J.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium, Washington, D.C. (1999) Whitten, A., Tygar, J.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium, Washington, D.C. (1999)
Metadata
Title
MEUSec – Method for Enhancing User Experience and Information Security
Authors
Max Sauer
Christoph Becker
Andreas Oberweis
Simon Pfeifer
Jan Sürmeli
Copyright Year
2025
DOI
https://doi.org/10.1007/978-3-031-78049-3_5

Premium Partner